The document outlines the access list for participants in the 6 CONS Industry Day 2025 event, scheduled for August 15, 2025, at MacDill Air Force Base. All entries are attributed to an individual named Jason Wilkin, identified by his contact number, indicating continued repetition of the same name in the list. The document serves as a formal record to ensure security and access control for participants linked to the event, which is likely part of a broader initiative for federal contracting opportunities. By consolidating participant data, it aims to maintain order and meet compliance related to base access protocols during the event. This information is pertinent for those involved in government RFPs and grants, emphasizing the importance of transparency and structured access during such gatherings. Overall, it reflects the military's commitment to managing event logistics effectively while ensuring the safety and security of the venue.
The Cybersecurity Maturity Model Certification (CMMC) Program, developed by the Department of Defense (DoD), aims to enhance cybersecurity within the defense industrial base. It establishes a tiered model requiring companies to implement progressively advanced cybersecurity standards based on the type and sensitivity of unclassified DoD information handled, specifically Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). CMMC status is valid for three years. The program outlines specific scoping requirements for each of its three levels, detailing the information systems and assets that must be assessed. DoD Program Managers determine the appropriate CMMC assessment level based on the data type managed by contractors and subcontractors. Solicitations will gradually incorporate CMMC Level 1, 2, or 3 requirements as a condition for contract awards, with Level 1 and 2 self-assessments starting at the rule effective date, and Level 2 and 3 certifications phased in over 12 and 24 months, respectively.
The DoD-CIO-00005 CMMC Scoping Guide for Level 1, Version 2.13, provides essential guidance for Organizations Seeking Assessment (OSAs) conducting Level 1 self-assessments under the Cybersecurity Maturity Model Certification (CMMC). This document clarifies existing requirements from 32 CFR § 170.19 and is intended for OSAs and their support professionals. The assessment scope defines which assets within an OSA's environment will be evaluated, with no specific documentation requirements for Level 1. In-scope assets are those that process, store, or transmit Federal Contract Information (FCI). Out-of-scope assets do not handle FCI, while Specialized Assets, such as IoT devices, GFE, and Operational Technology, are also excluded from the assessment despite potentially handling FCI due to their inability to be fully secured. The guide emphasizes considering people, technology, facilities, and external service providers when scoping, as these elements directly relate to fulfilling Level 1 security requirements. Significant architectural or boundary changes necessitate a new assessment, while operational changes within an existing scope are covered by annual affirmations.
This document, the CMMC Scoping Guide Level 2, provides essential guidance for Organizations Seeking Assessment (OSAs) and Organizations Seeking Certification (OSCs) regarding the Cybersecurity Maturity Model Certification (CMMC) Level 2. It outlines the process for identifying and defining the CMMC Assessment Scope, categorizing assets into five types: CUI Assets, Security Protection Assets, Contractor Risk Managed Assets, Specialized Assets, and Out-of-Scope Assets. The guide details the specific documentation and assessment requirements for each asset category. It also provides additional guidance on separation techniques for assets, considerations for External Service Providers (ESPs), and various use cases such as handling Federal Contract Information (FCI) and the use of enclaves. The primary purpose is to clarify existing CMMC requirements and ensure a standardized approach to Level 2 assessments, which can be either self-assessments or certification assessments conducted by a C3PAO.
The DoD-CIO-00007 (ZRIN 0790-ZA23) CMMC Scoping Guide Level 3 provides essential guidance for Organizations Seeking Certification (OSCs) aiming for Level 3 Cybersecurity Maturity Model Certification. This document clarifies the scope of assessments, asset categorization, and associated requirements under 32 CFR § 170.19. It defines four asset categories: Controlled Unclassified Information (CUI) Assets, Security Protection Assets, Specialized Assets, and Out-of-Scope Assets, detailing their descriptions, OSC responsibilities, and CMMC assessment requirements. The guide mandates comprehensive documentation, including asset inventories and network diagrams, and outlines specific considerations for External Service Providers (ESPs), including Cloud Service Providers (CSPs), regarding FedRAMP compliance and assessment scope. It emphasizes that Level 2 Plan of Action and Milestones (POA&M) items must be closed before initiating a Level 3 assessment and that significant architectural or boundary changes necessitate a new assessment.
The provided document appears to be an attendee list for an event, likely a pre-bid conference or an industry day, related to government contracting. It lists various companies, their number of attendees, and their locations (city and state). The companies represent a range of services including construction, roofing, engineering, environmental assessments, and electrical work, indicating a diverse interest in potential government contracts. The majority of the attendees are from Florida, particularly the Tampa area, suggesting the event or the opportunities it pertains to are primarily based in or relevant to Florida. Other states represented include Alabama, Georgia, California, and Mississippi. The document highlights the engagement of various businesses, including small and large enterprises, in the government contracting sector, aiming to secure federal or state/local RFPs or grants.
The 6th Contracting Squadron hosted an Industry Day for its Multiple Award Construction Contract (MACC) 4.0 at MacDill Air Force Base (AFB) on August 15, 2025. This event provided an overview of the squadron's mission to support various commands and partners, including USSOCOM and USCENTCOM, with over $1 billion in contracting. The MACC 4.0, a Firm Fixed Price IDIQ contract with an estimated ceiling of $500M over 7-10 years, will focus on commercial and institutional building construction (NAICS 236220). The briefing detailed the MACC 3.0, its predecessor, which involved 19 contractors for projects like the KC-46 Expansion and hurricane repair. Key elements of MACC 4.0 include a "Best Value Trade-Off" selection criterion and requirements for demonstrable capabilities in mechanical, electrical, and design work. The acquisition process will include a Draft RFP in Q1 2026 and an anticipated award date of March 2027. Attendees were advised on base access rules, prohibited items, visitor pass requirements, and environmental compliance, including unique Florida considerations like hurricanes and high water tables. The 6th Civil Engineer Squadron (CES) also presented its role in maintaining base infrastructure, covering various project categories such as HVAC, roofing, and pavements, emphasizing the "mission-driven" nature of projects on military installations. Contractors were encouraged to register in SAM under NAICS 236220 and to submit well-prepared proposals, as the government does not anticipate exchanges.
The 2025 MACC 4.0 Industry Day Questions & Answers document outlines key aspects of the upcoming Multiple Award Construction Contract (MACC) at MacDill AFB. It addresses contractor concerns regarding base access and background checks, emphasizing the importance of hiring U.S. citizens and proper documentation for foreign nationals. The document clarifies that while initial MACC awards will be based on best value, subsequent task orders will primarily be lowest price. It also details the government's approach to design and construction, requiring design completion before construction begins due to risk management. Key insights include the government's efforts to learn from MACC 3.0, the desire for a larger pool of contractors for new perspectives, and the typical task order range of $200K - $8M. The document also touches on CMMC requirements, invoicing, and the application of the Buy America Act.
This document addresses key questions regarding a federal government Multiple Award Construction Contract (MACC). Projects will be a mix of design-build and design-bid-build, with task order values ranging from $100K to $5M. The anticipated average is 28.5 projects annually, valued between $250K and $500K. The government plans for an on/off-ramp system for contractors during the MACC's life. Security requirements will be detailed in task order Statements of Work (SOWs), beyond standard base access. Performance will be evaluated using CPARS ratings for projects over $750K, focusing on Quality, Schedule, Management, and Regulatory Compliance. Sustainability and energy-efficiency, including LEED products for lighting, are expected. Joint ventures must ensure all concerns are individually registered as small businesses in SAM. A draft SOW for the MACC is planned, with consideration for releasing a Task Order Seed project scope. The established NAICS code is deemed sufficient for the contract's multi-capability needs.